Cybercrime Gangs Abscond With Thousands of AWS Credentials

December 10, 2024 at 11:21AM Cybercriminal gangs exploited public website vulnerabilities to steal AWS cloud credentials from numerous organizations, uncovered by researchers from CyberCyber Labs. The attackers, linked to groups Nemesis and ShinyHunters, misconfigured an AWS S3 bucket containing stolen data. AWS confirmed the incident was due to customer application flaws, not their systems. ### … Read more

Wald.ai Raises $4M in Seed Funding to Protect Data in Conversations With AI Assistants

December 10, 2024 at 11:16AM Palo Alto startup Wald.ai launched a contextual AI and data loss protection platform, enabling enterprises to safely use AI assistants while automatically redacting sensitive information. Priced at $19.99 per user monthly, the platform is currently utilized in healthcare, finance, and legal sectors, and offers a 14-day free trial. ### Meeting … Read more

AMD secure VM tech undone by DRAM meddling

December 10, 2024 at 11:10AM Researchers revealed that AMD’s Secure Encrypted Virtualization (SEV) can be compromised using low-cost hardware. Their “BadRAM” attack exploits the SPD chip to bypass memory access restrictions. This vulnerability undermines SEV’s integrity and affects major cloud providers, prompting AMD to prepare an advisory and recommend securing SPD locks on memory modules. … Read more

New Cleo zero-day RCE flaw exploited in data theft attacks

December 10, 2024 at 10:11AM Hackers are leveraging a zero-day vulnerability in Cleo managed file transfer software to infiltrate corporate networks and execute data theft attacks. This highlights the urgent need for organizations to address security weaknesses and implement protective measures against such threats. **Meeting Notes Takeaways:** 1. **Current Threat:** Hackers are exploiting a zero-day … Read more

Inside the incident: Uncovering an advanced phishing attack

December 10, 2024 at 10:11AM The article by Varonis Security Specialist Tom Barnea discusses the evolution of sophisticated phishing attacks that exploit AI and legitimate platforms. A specific case involving a U.K. insurance company illustrates how attackers used a trusted sender’s email and created deceptive links. Recommendations emphasize user awareness and technical measures for prevention. … Read more

Lessons From the Largest Software Supply Chain Incidents

December 10, 2024 at 09:59AM Marc Andreessen’s phrase “Software is eating the world” remains relevant as software transforms industries and boosts the economy. However, the rapid growth in software development has led to a surge in supply chain attacks, with predictions of increased occurrences. Organizations must prioritize security, vet vendors diligently, and evaluate their entire … Read more

Cleo File Transfer Tool Vulnerability Exploited in Wild Against Enterprises

December 10, 2024 at 09:48AM Huntress warned of an exploited vulnerability (CVE-2024-50623) in Cleo’s file transfer products, affecting over 1,700 servers, mostly in consumer and shipping sectors. Despite a patch, it failed to secure systems, allowing unauthorized access and persistent threats. Cleo plans to release a new patch shortly. **Meeting Takeaways:** 1. **Vulnerability Identified**: Huntress … Read more

Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam

December 10, 2024 at 09:48AM Cybersecurity researchers have uncovered a mobile phishing campaign distributing an updated Antidot banking trojan, luring victims through fake job offers. Attackers prompt downloads of malicious apps, enabling extensive device control and data theft. Targeting multilingual users, the advanced malware requires robust protection measures to prevent significant data loss and financial … Read more

SAP Patches Critical Vulnerability in NetWeaver

December 10, 2024 at 08:57AM SAP released nine new and four updated security notes on December 2024 Security Patch Day, addressing critical vulnerabilities in NetWeaver AS for Java. Notably, CVE-2024-47578 poses a significant risk of complete system compromise. Users are urged to implement the security updates promptly, although there are no known active exploits. ### … Read more

Fully patched Cleo products under renewed ‘zero-day-ish’ mass attack

December 10, 2024 at 08:44AM Huntress reports widespread exploitation of a vulnerability in Cleo file management products, affecting patched systems. The bug, CVE-2024-50623, allows remote code execution, impacting over 1,700 servers. At least ten customers are compromised, prompting Huntress to recommend firewall protection and other mitigations while awaiting an updated patch from Cleo. ### Meeting … Read more